INFORMS Philadelphia – 2015
92
3 - An Empirical Analysis of Sustainable Supply Chain Capabilities
and Cross-Value Integration
Peiran Gao, Huazhong University of Science and Technology,
School of Management, 1037 Luoyu Road, Wuhan, China,
gaopeiran2007@126.com, Yeming Gong, Jinlong Zhang
Using multi-source data from more than 100 organizations in retailing industry,
we apply structural equation modeling to understand nonlinear relationship
among cross-value integration, supply chain coordination and integration, and
the performance of sustainable supply chain. We find the moderate effect of cross-
value integration on the relationship between sustainable supply chain
capabilities and operational competencies.
4 - Storage Location and Pick Position Assignment Problem for
MIAPP-AS/RS
Faraz Ramtin, University of Central Florida, 2011 Puritan Rd,
Orlando, FL, 32807, United States of America,
faraz.ramtin@ucf.edu,Jennifer Pazour
MIAPP-AS/RS is a semi-automated case-level order fulfillment technology. The
put-away to the storage locations and replenishment to pick positions are
performed by the crane and the in-the-aisle case-picking is done by human order
pickers. We develop binary integer models to find the optimal assignment of SKUs
to storage locations, as well as to pick positions for a dedicated storage policy. We
develop an accelerated Benders Decomposition approach to improve the
tractability of the models.
SB79
79-Room 302, CC
Software Demonstration
Cluster: Software Demonstrations
Invited Session
1 - Simio Simulation and Scheduling Software - Introduction to Simio
Simulation and Scheduling Software
C Dennis Pegden, CEO and Founder, Simio Simulation and
Scheduling Software, Eric Howard
Simio is a premier simulation and scheduling software that allows you to expand
traditional benefits of simulation to improve daily operations. In this tutorial, we
will demonstrate Simio’s 3D rapid modeling capability to effectively solve real
problems. Explore how a single tool can be used to not only optimize your system
design, but also provide effective planning and scheduling. Come explore the
Simio difference and see why so many professional and novice simulationists are
changing to Simio.
2 - Forio Simulations - Publishing Interactive Analytics or Operations
Research Models on the Web
Michael Bean, Co-Founder and President, Forio Simulations
Forio’s web platform makes your analytic model available to hundreds of people
within your organization through the browser. We will start with an introduction
to the platform and example analytics applications. Then we’ll divide the
workshop into two parts. In the first part we will teach you how to get your
analysis on a server so it can be shared. In the second part we’ll focus on creating
a user interface for your model.
Sunday, 1:30pm - 3:00pm
SC01
01-Room 301, Marriott
Military O.R. and Applications I
Sponsor: Military Applications
Sponsored Session
Chair: Michael Hirsch, ISEA TEK, 620 N. Wymore Rd., Ste. 260,
Maitland, FL, 32751, United States of America,
mhirsch@iseatek.com1 - An Algorithm for Solving the Convoy Routing Problem
Ambika Tiwari, Research Scholar, IIT Madras, DoMS,Delhi
Avenue, 834, Sabarmati Hostel, Chennai, 600036, India,
tiwariambika4@gmail.com, Chandrasekharan Rajendran,
Hans Zeigler
The problem of routing military convoys from a specific origin to a destination
adhering to certain constraints is considered. An algorithm for minimizing the
sum of arrival times at destination of the convoys is proposed. Its performance
with respect to that of existing algorithm is analyzed. Computational results are
presented.
2 - The Spectrum of Anarchy: Algorithmic Game Theory in
UAV Routing
Michael Couche, University at Buffalo, 342 Bell Hall, Buffalo,
United States of America,
mjcouche@gmail.com,Nagi Rakesh,
Mark Karwan
Game theoretic routing approaches lend insight into the price of anarchy that
occurs due to decentralization. We can model a team of UAVs using several
different approaches, ranging from greedy-based routing, competitive gaming,
leader-follower gaming, to cooperative gaming. A comparison of the algorithms
used is presented, along with a discussion of using these approaches as a fast
routing heuristic that competes with mathematical programming models.
3 - Optimization of UAV Teams
Hector Ortiz-pena, CUBRC, Genesee St, Buffalo, United States of
America,
hector.ortiz-pena@cubrc.org, Michael Hirsch,
Moises Sudit, Mark Karwan
We develop a formulation to maximize the information gain from a team of
autonomous unmanned vehicles (UxVs) to support Intelligence, Surveillance and
Reconnaissance (ISR) mission objectives. The formulation is used to evaluate the
Price of Anarchy.
SC02
02-Room 302, Marriott
Cyber-Physical Protection Models and Analysis
Cluster: Homeland Security
Invited Session
Chair: Feng Pan, Research Engineer, Pacific Northwest National
Laboratory, P.O. Box 999 MSIN K1-85, Richland, WA, 99352,
United States of America,
feng.pan@pnnl.govCo-Chair: Guanhua Yan, Assistant Professor, Binghamton University,
Department of Computer Science, Binghamton, NY, 13902,
United States of America,
ghyan@binghamton.edu1 - Analytical Framework for Cyber-physical Integrated Assessment:
An Overview
Matthew Oster, Pacific Northwest National Laboratory, 902
Battelle Blvd, Richland, WA, 99352, United States of America,
matthew.oster@pnnl.gov, Casey Perkins
Cyber and physical security systems present a unique challenge for security
analyses traditionally charged with focusing on only a singular aspect of the
system, either physical or cyber. Looking at an integrated security environment
requires revisiting vulnerability analysis methods and integrating previously
isolated evaluations. This talk will focus on the challenge of creating an integrated
modeling framework with both physical and cyber security elements to quantify
hidden vulnerability.
2 - A Big Data Approach to Automating Malware Analysis
Guanhua Yan, Assistant Professor, Binghamton University,
Department of Computer Science, Binghamton, NY, 13902,
United States of America,
ghyan@binghamton.edu,Yunus Kucuk
Thwarting the severe threat posed by the voluminous malware variants demands
effective, yet efficient, techniques for malware analysis. We propose a big data
framework for automated malware analysis. This framework combines various
big data tools to provide a unifying and scalable solution to a wide range of
malware analysis tasks, such as classification, clustering, and indexing. We will
present our experience with developing this framework, as well as the research
challenges ahead.
3 - A Mixed Integer Program for Securing a Cyber-physical System
Feng Pan, Research Engineer, Pacific Northwest National
Laboratory, P.O. Box 999 MSIN K1-85, Richland, WA, 99352,
United States of America,
feng.pan@pnnl.gov,Casey Perkins,
Samrat Chatterjee, Satish Chikkagoudar, Matthew Oster
Securing a modern facility has to consider both cyber and physical aspects. In this
talk, we present a set of metrics for measuring facility security. Given the
complexity of facilities, simulation models are often used to measure the overall
security. Combining simulation results, we introduce a mixed integer
programming approach to allocate security assets in both cyber and physical
layers for enhancing security of a facility.
SB79